Skip to main content

A Pattern-Based Method for Identifying and Analyzing Laws

  • Conference paper
Requirements Engineering: Foundation for Software Quality (REFSQ 2012)

Abstract

Nowadays many legislators decided to enact different laws, which all enforce legal and natural persons to deal more carefully with IT systems. Hence, there is a need for techniques to identify and analyze laws which are relevant for an IT system. But identifying relevant compliance regulations for an IT system and aligning it to be compliant is a challenging task. This paper presents a novel method for identifying and analyzing laws. The method makes use of different kinds of law analysis patterns that allow legal experts and software and system developers to understand and elicit relevant laws for the given development problem. Our approach also helps to detect dependent laws. We illustrate our method using an online-banking cloud scenario.

This research was partially supported by the EU project Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS, ICT-2009.1.4 Trustworthy ICT, Grant No. 256980).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biagioli, C., Mariani, P., Tiscornia, D.: Esplex: A rule and conceptual model for representing statutes. In: Proceedings of the 1st International Conference on Artificial Intelligence and Law, ICAIL 1987, pp. 240–251. ACM (1987)

    Google Scholar 

  2. Otto, P.N., Antón, A.I.: Addressing legal requirements in requirements engineering. In: Proceedings of the International Conference on Requirements Engineering (RE), pp. 5–14. IEEE Computer Society (2007)

    Google Scholar 

  3. Schwacke, P.: Juristische Methodik mit Technik der Fallbearbeitung, 4th edn. Kohlhammer Deutscher, Gemeindeverlag (2003)

    Google Scholar 

  4. Larenz, K.: Methodenlehre der Rechtswissenschaft, 5th edn. Springer, Heidelberg (1983)

    Google Scholar 

  5. Beaucamp, G., Treder, L.: Methoden und Techniken der Rechtsanwendung, 2nd edn. C.F.Müller (2011)

    Google Scholar 

  6. Breaux, T.D., Antón, A.I.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1), 5–20 (2008)

    Article  Google Scholar 

  7. Siena, A., Perini, A., Susi, A.: From laws to requirements. In: Proceedings of the International Workshop on Requirements Engineering and Law (RELAW), pp. 6–10. IEEE Computer Society (2008)

    Google Scholar 

  8. Álvarez, J.A.T., Olmos, A., Piattini, M.: Legal requirements reuse: A critical success factor for requirements quality and personal data protection. In: Proceedings of the International Conference on Requirements Engineering (RE), pp. 95–103. IEEE Computer Society (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beckers, K., Faßbender, S., Küster, JC., Schmidt, H. (2012). A Pattern-Based Method for Identifying and Analyzing Laws. In: Regnell, B., Damian, D. (eds) Requirements Engineering: Foundation for Software Quality. REFSQ 2012. Lecture Notes in Computer Science, vol 7195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28714-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28714-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28713-8

  • Online ISBN: 978-3-642-28714-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics